Feds Go Mobile with Neutered iPads

By Wayne Adam February 15, 2013

BlackBerry has long been the phone of choice for governmental use due to their mobile encryption and security levels, but now there’s a new kid in town. CACI International, Inc. has taken the iPad and modified it into a “neutered iPad,” making these devices secure for government use by altering the hardware instead of providing software and according to Bloomberg; “thousands” of iPads have been modified.

“It’s a neutered iPad,” Allen said today during a meeting with Bloomberg Government reporters and editors. “We’re working on how [to] effectively brand it.”

In addition, “We’re looking at how do you go chase that market and how do you put partnerships in place,” Allen said. “The things that we’re doing with Apple around mobility – it’s a broad market play.”

Although CACI is hush-hush on what specific modifications were made to make neutered iPads – except the removal of Wi-Fi and camera features, which are considered security risks – it’s apparent that the feds are investing heavily into mobile technology.

For example, the Defense Department announced last year it planned to open its networks to both iPhones and Android-based smartphones.

This move toward mobile technology comes with its share of problems, as in the case of the U.S. Air Force, which withdrew plans to purchase thousands of iPads over security concerns about software originated in Russia.

Even so, mobile technology for the Feds is being used in every echelon, all the way up to President Obama, where the question was raised if his iPad was a “neutered” iPad.

Allen said iPads used by U.S. government leaders are “most likely a product that either came from us or came from someone we work with.”




Edited by Braden Becker

Contributing Writer

SHARE THIS ARTICLE
Related Articles

Predicting the FCC's Path Forward Under President-Elect Donald Trump

By: Special Guest    12/6/2016

President-elect Donald J. Trump will become the 45th President of the United States of America on January 20, 2017. Many in the tech, media and teleco…

Read More

From Social Media to Sour Media in 2016

By: Doug Mohney    12/5/2016

Lost all patience with re-written news with misleading headlines? How many people have you un-friended over the last twelve months on Facebook? Been a…

Read More

The Five Core Components of Proactive Cybersecurity

By: Special Guest    12/5/2016

As technically astute and often well-funded hackers continue to deploy new, constantly evolving techniques, organizations are too often focusing their…

Read More

How Real Time Visibility and Data Analysis are Driving Innovation

By: Special Guest    12/5/2016

The IoT has enabled everything from improved efficiency for global shipping networks to devices that receive environmental feedback from home applianc…

Read More

Top 5 Most In-Demand, Highest-Paying Tech Jobs in 2017

By: Special Guest    11/30/2016

So while tech may be automating a whole lot of traditionally analog jobs, the tech sector is also responsible for a good deal of the job creation in t…

Read More